You can designate separate operating system groups as the operating system authentication groups for privileges on Oracle ASM. The following list describes the separate operating system authentication groups for Oracle ASM and the privileges that their members are granted.
OSASM group
This group is granted the SYSASM privilege, which provides full administrative privileges for the Oracle ASM instance. For example, the group could be asmadmin
.
OSDBA for Oracle ASM group
This group is granted the SYSDBA privilege on the Oracle ASM instance, which grants access to data stored on Oracle ASM. This group has a subset of the privileges of the OSASM group.
When you implement separate administrator privileges, choose an OSDBA group for the Oracle ASM instance that is different than the group that you select for the database instance, such as dba
. For example, the group could be asmdba
.
OSOPER for Oracle ASM group
This group is granted the SYSOPER privilege on the Oracle ASM instance, which provides operations such as startup, shutdown, mount, dismount, and check disk group. This group has a subset of the privileges of the OSASM group. For example, the group could be asmoper
.
When you implement separate Oracle ASM and database administrator duties, this configuration requires different group and different software owners. Implicitly this implementation requires that the OSASM and OSDBA are different groups. For this configuration, you must create an OSDBA for Oracle ASM group and a database instance must be a member of that group to access the Oracle ASM instance.
In an installation that has been configured as Oracle Grid Infrastructure, the Oracle ASM user, such as grid
, does not have to be a member of the Oracle Database OSDBA group, such as dba1
or dba2
, because the Oracle Clusterware database agent runs as the database owner and can use SYSDBA to connect to the database.
However, in an Oracle Restart configuration, the Oracle ASM user (grid
) must be a member of the OSDBA group (dba1
, dba2
, ...) of every database. This requirement is necessary because Oracle Restart software runs as the Oracle ASM user (grid
) and this user must be able to start and stop the databases using the CONNECT
/
AS
SYSDBA
authentication.
Additionally, the owner of the operating system disk devices should be the same as the owner of the Oracle ASM software.
Table 3-2 shows an example of a Linux deployment using separate operating system privilege groups for Oracle ASM users.
Table 3-2 Separated operating system groups and privileges for Oracle ASM users
Role/Software Owner | User | Group/Privilege |
---|---|---|
Oracle ASM administrator/Oracle Grid Infrastructure home |
grid |
asmadmin (OSASM)/SYSASM asmdba (OSDBA for ASM)/SYSDBA asmoper (OSOPER for ASM)/SYSOPER dba1, dba2, ... (OSDBA for the databases when in an Oracle Restart configuration) |
Database administrator 1/Database home 1 |
oracle1 |
asmdba (OSDBA for ASM)/SYSDBA oper1 (OSOPER for database 1)/SYSOPER dba1 (OSDBA for database 1)/SYSDBA |
Database administrator 2/Database home 2 |
oracle2 |
asmdba (OSDBA for ASM)/SYSDBA oper2 (OSOPER for database 2)/SYSOPER dba2 (OSDBA for database 2)/SYSDBA |
Operating system disk device owner |
grid |
asmadmin (OSASM) |